Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: a Study of Location-Based Services

Total Page:16

File Type:pdf, Size:1020Kb

Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: a Study of Location-Based Services This article was downloaded by: [130.203.152.80] On: 19 February 2014, At: 06:34 Publisher: Institute for Operations Research and the Management Sciences (INFORMS) INFORMS is located in Maryland, USA Information Systems Research Publication details, including instructions for authors and subscription information: http://pubsonline.informs.org Research Note—Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services Heng Xu, Hock-Hai Teo, Bernard C. Y. Tan, Ritu Agarwal, To cite this article: Heng Xu, Hock-Hai Teo, Bernard C. Y. Tan, Ritu Agarwal, (2012) Research Note—Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services. Information Systems Research 23(4):1342-1363. http://dx.doi.org/10.1287/isre.1120.0416 Full terms and conditions of use: http://pubsonline.informs.org/page/terms-and-conditions This article may be used only for the purposes of research, teaching, and/or private study. Commercial use or systematic downloading (by robots or other automatic processes) is prohibited without explicit Publisher approval. For more information, contact [email protected]. The Publisher does not warrant or guarantee the article’s accuracy, completeness, merchantability, fitness for a particular purpose, or non-infringement. Descriptions of, or references to, products or publications, or inclusion of an advertisement in this article, neither constitutes nor implies a guarantee, endorsement, or support of claims made of that product, publication, or service. Copyright © 2012, INFORMS Please scroll down for article—it is on subsequent pages INFORMS is the largest professional society in the world for professionals in the fields of operations research, management science, and analytics. For more information on INFORMS, its publications, membership, or meetings visit http://www.informs.org Information Systems Research Vol. 23, No. 4, December 2012, pp. 1342–1363 ISSN 1047-7047 (print) ISSN 1526-5536 (online) http://dx.doi.org/10.1287/isre.1120.0416 © 2012 INFORMS Research Note Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services Heng Xu College of Information Sciences and Technology, The Pennsylvania State University, University Park, Pennsylvania 16802, [email protected] Hock-Hai Teo Department of Information Systems, National University of Singapore, School of Computing, Singapore 117418, [email protected] Bernard C. Y. Tan Department of Information Systems, National University of Singapore, School of Computing, Singapore 117418, [email protected] Ritu Agarwal Robert H. Smith School of Business, University of Maryland, College Park, Maryland 20742, [email protected] his study seeks to clarify the nature of control in the context of information privacy to generate insights into Tthe effects of different privacy assurance approaches on context-specific concerns for information privacy. We theorize that such effects are exhibited through mediation by perceived control over personal information and develop arguments in support of the interaction effects involving different privacy assurance approaches (individual self-protection, industry self-regulation, and government legislation). We test the research model in the context of location-based services using data obtained from 178 individuals in Singapore. In general, the results support our core assertion that perceived control over personal information is a key factor affecting context-specific concerns for information privacy. In addition to enhancing our theoretical understanding of the link between control and privacy concerns, these findings have important implications for service providers and consumers as well as for regulatory bodies and technology developers. Key words: privacy; context-specific concerns for information privacy; psychological control; control agency; individual self-protection; industry self-regulation; and government regulation History: Elena Karahanna, Senior Editor; Mariam Zahedi, Associate Editor. This paper was received on August 20, 2008, and was with the authors 24 months for 4 revisions. Published online in Articles in Advance April 18, 2012. 1. Introduction online transactions or adoptions of new technologies Information privacy is an increasingly critical concern in the presence of significant privacy concerns. for many individuals around the world. The global It has been posited that individuals tend to have diffusion of mobile technologies and the unbounded lower privacy concerns if they perceive a certain options for gathering, storing, processing, disseminat- degree of control over the collection and use of their personal information (Dinev and Hart 2004, ing, and exploiting personal information trigger con- Xu et al. 2008). Considering the potential impor- sumer concerns (FTC 2010). Over the past decade, Downloaded from informs.org by [130.203.152.80] on 19 February 2014, at 06:34 . For personal use only, all rights reserved. tance of control in the context of information privacy, scholars in information systems have examined the this study explores and empirically demonstrates topic of privacy concerns (e.g., Angst and Agarwal the contribution of the psychological control theo- 2009, Bansal et al. 2010, Dinev and Hart 2006, Malho- ries to understanding information privacy. We con- tra et al. 2004, Son and Kim 2008) related to the collec- ducted an experimental study in the specific context tion and use of personal information from a variety of location-based services (LBS). Three privacy assur- of different perspectives. A general conclusion from ance approaches (individual self-protection, indus- this stream of research is that individuals would resist try self-regulation, and government legislation) were 1342 Xu et al.: Privacy Assurances, Perceived Control, and Privacy Concerns Information Systems Research 23(4), pp. 1342–1363, © 2012 INFORMS 1343 manipulated in the experiment and their effects dissemination, and invasion activities. Culnan and on control perceptions and privacy concerns were Williams (2009) argue that these activities on infor- examined. mation reuse and unauthorized access by organiza- The current study contributes to existing pri- tions “can potentially threaten an individual’s ability vacy research in several important ways. First, prior to maintain a condition of limited access to his/her research has shown a lack of clarity in explicating personal information” (p. 675). Solove’s groundwork the link between control and privacy: some studies (2007) for a pluralistic conception of privacy differen- have defined privacy as control per se (e.g., Goodwin tiates the concept of privacy (as an individual state) 1991, Milne and Rohm 2000); others have positioned from the management of privacy (arising from organi- control as a key factor shaping privacy (e.g., Laufer zational information processing activities). From the and Wolfe 1977, Dinev and Hart 2004). There have perspectives of individuals (Dhillon and Moores 2001, been very few attempts to bring control theories into Schoeman 1984), we define privacy as a state of lim- privacy research to clarify the nature of control. The ited access to personal information. current research contributes to this controversial issue Another challenge faced in understanding privacy by explicating this control—privacy contention. Sec- is the diversity of measurements used by prior ond, following the call by Margulis (2003a, b), cur- research. Measures that have been adopted for the rent research has explicitly integrated the literature on examinations of privacy include attitudes toward pri- psychological control into theories of privacy. Toward vacy (e.g., Buchanan et al. 2007), concerns for privacy this end, we have adopted the control agency the- (e.g., Smith et al. 1996), and privacy-related behav- ory to make a theoretical distinction of different pri- ioral intentions (e.g., Dinev and Hart 2006). Based on vacy assurance approaches by explicitly linking them an extensive review of privacy literature, Smith et al. with different types of control agencies. Finally, most (2011) note that the variable of “privacy concerns” existing privacy research focuses on examining the becomes the central construct within IS research and individual effect of privacy assurance approaches it has become the proxy to operationalize the con- (e.g., Culnan and Bies 2003, Metzger 2006). Build- cept of “privacy.” Specifically, the Smith et al. (1996) ing on the control agency framework, this research Concern for Information Privacy (CFIP) scale has extends the literature by proposing interaction effects been considered as one of the most reliable scales of these privacy assurance approaches on alleviating for measuring privacy concerns, using four data- privacy concerns, based on the type of control agen- related dimensions: collection, errors, unauthorized cies they can provide. secondary use, and improper access to information. In what follows, we first provide an overview of As Bansal et al. (2008) note, these four dimensions of prior relevant literature to establish a theoretical foun- CFIP supported the underlying definitions of the U.S. dation for studying privacy, privacy concerns, control, Federal Trade Commission’s (FTC) fair information and privacy assurance approaches. Then we develop practices (FTC 2000), which include the
Recommended publications
  • Achieving High Coverage for Floating-Point Code Via Unconstrained Programming
    Achieving High Coverage for Floating-Point Code via Unconstrained Programming Zhoulai Fu Zhendong Su University of California, Davis, USA [email protected] [email protected] Abstract have driven the research community to develop a spectrum Achieving high code coverage is essential in testing, which of automated testing techniques for achieving high code gives us confidence in code quality. Testing floating-point coverage. code usually requires painstaking efforts in handling floating- A significant challenge in coverage-based testing lies in point constraints, e.g., in symbolic execution. This paper turns the testing of numerical code, e.g., programs with floating- the challenge of testing floating-point code into the oppor- point arithmetic, non-linear variable relations, or external tunity of applying unconstrained programming — the math- function calls, such as logarithmic and trigonometric func- ematical solution for calculating function minimum points tions. Existing solutions include random testing [14, 23], over the entire search space. Our core insight is to derive a symbolic execution [17, 24], and various search-based strate- representing function from the floating-point program, any of gies [12, 25, 28, 31], which have found their way into many whose minimum points is a test input guaranteed to exercise mature implementations [16, 39]. Random testing is easy to a new branch of the tested program. This guarantee allows employ and fast, but ineffective in finding deep semantic is- us to achieve high coverage of the floating-point program by sues and handling large input spaces; symbolic execution and repeatedly minimizing the representing function. its variants can perform systematic path exploration, but suf- We have realized this approach in a tool called CoverMe fer from path explosion and are weak in dealing with complex and conducted an extensive evaluation of it on Sun’s C math program logic involving numerical constraints.
    [Show full text]
  • The Later Han Empire (25-220CE) & Its Northwestern Frontier
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2012 Dynamics of Disintegration: The Later Han Empire (25-220CE) & Its Northwestern Frontier Wai Kit Wicky Tse University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian History Commons, Asian Studies Commons, and the Military History Commons Recommended Citation Tse, Wai Kit Wicky, "Dynamics of Disintegration: The Later Han Empire (25-220CE) & Its Northwestern Frontier" (2012). Publicly Accessible Penn Dissertations. 589. https://repository.upenn.edu/edissertations/589 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/589 For more information, please contact [email protected]. Dynamics of Disintegration: The Later Han Empire (25-220CE) & Its Northwestern Frontier Abstract As a frontier region of the Qin-Han (221BCE-220CE) empire, the northwest was a new territory to the Chinese realm. Until the Later Han (25-220CE) times, some portions of the northwestern region had only been part of imperial soil for one hundred years. Its coalescence into the Chinese empire was a product of long-term expansion and conquest, which arguably defined the egionr 's military nature. Furthermore, in the harsh natural environment of the region, only tough people could survive, and unsurprisingly, the region fostered vigorous warriors. Mixed culture and multi-ethnicity featured prominently in this highly militarized frontier society, which contrasted sharply with the imperial center that promoted unified cultural values and stood in the way of a greater degree of transregional integration. As this project shows, it was the northwesterners who went through a process of political peripheralization during the Later Han times played a harbinger role of the disintegration of the empire and eventually led to the breakdown of the early imperial system in Chinese history.
    [Show full text]
  • The Road to Literary Culture: Revisiting the Jurchen Language Examination System*
    T’OUNG PAO 130 T’oung PaoXin 101-1-3 Wen (2015) 130-167 www.brill.com/tpao The Road to Literary Culture: Revisiting the Jurchen Language Examination System* Xin Wen (Harvard University) Abstract This essay contextualizes the unique institution of the Jurchen language examination system in the creation of a new literary culture in the Jin dynasty (1115–1234). Unlike the civil examinations in Chinese, which rested on a well-established classical canon, the Jurchen language examinations developed in close connection with the establishment of a Jurchen school system and the formation of a literary canon in the Jurchen language and scripts. In addition to being an official selection mechanism, the Jurchen examinations were more importantly part of a literary endeavor toward a cultural ideal. Through complementing transmitted Chinese sources with epigraphic sources in Jurchen, this essay questions the conventional view of this institution as a “Jurchenization” measure, and proposes that what the Jurchen emperors and officials envisioned was a road leading not to Jurchenization, but to a distinctively hybrid literary culture. Résumé Cet article replace l’institution unique des examens en langue Jurchen dans le contexte de la création d’une nouvelle culture littéraire sous la dynastie des Jin (1115–1234). Contrairement aux examens civils en chinois, qui s’appuyaient sur un canon classique bien établi, les examens en Jurchen se sont développés en rapport étroit avec la mise en place d’un système d’écoles Jurchen et avec la formation d’un canon littéraire en langue et en écriture Jurchen. En plus de servir à la sélection des fonctionnaires, et de façon plus importante, les examens en Jurchen s’inscrivaient * This article originated from Professor Peter Bol’s seminar at Harvard University.
    [Show full text]
  • Daily Life for the Common People of China, 1850 to 1950
    Daily Life for the Common People of China, 1850 to 1950 Ronald Suleski - 978-90-04-36103-4 Downloaded from Brill.com04/05/2019 09:12:12AM via free access China Studies published for the institute for chinese studies, university of oxford Edited by Micah Muscolino (University of Oxford) volume 39 The titles published in this series are listed at brill.com/chs Ronald Suleski - 978-90-04-36103-4 Downloaded from Brill.com04/05/2019 09:12:12AM via free access Ronald Suleski - 978-90-04-36103-4 Downloaded from Brill.com04/05/2019 09:12:12AM via free access Ronald Suleski - 978-90-04-36103-4 Downloaded from Brill.com04/05/2019 09:12:12AM via free access Daily Life for the Common People of China, 1850 to 1950 Understanding Chaoben Culture By Ronald Suleski leiden | boston Ronald Suleski - 978-90-04-36103-4 Downloaded from Brill.com04/05/2019 09:12:12AM via free access This is an open access title distributed under the terms of the prevailing cc-by-nc License at the time of publication, which permits any non-commercial use, distribution, and reproduction in any medium, provided the original author(s) and source are credited. An electronic version of this book is freely available, thanks to the support of libraries working with Knowledge Unlatched. More information about the initiative can be found at www.knowledgeunlatched.org. Cover Image: Chaoben Covers. Photo by author. Library of Congress Cataloging-in-Publication Data Names: Suleski, Ronald Stanley, author. Title: Daily life for the common people of China, 1850 to 1950 : understanding Chaoben culture / By Ronald Suleski.
    [Show full text]
  • Yanqing Xu Assistant Professor Department of Geography and Planning the University of Toledo Toledo, OH 43606 Phone: 419-530-4196 E-Mail: [email protected]
    Yanqing Xu Assistant Professor Department of Geography and Planning The University of Toledo Toledo, OH 43606 Phone: 419-530-4196 E-mail: [email protected] Education 2014 Ph.D. in Geography Louisiana State University Dissertation: Built Environment and Risk of Obesity in the United States: A Multilevel Modeling Approach Advisor: Dr. Fahui Wang 2010 M.S. in Cartography and GIS Wuhan University, China Thesis: The Research of Web Map Service Based on Google Maps API Advisor: Dr. Youchuan Wan 2008 B.A. in English (secondary degree) Huazhong University of Science & Technology, China 2008 B. Eng. in GIS China University of Geosciences (Wuhan), China Professional Positions 08/2015 – Present Assistant Professor, Department of Geography & Planning, University of Toledo 10/2014 – 07/2015 Technical Lead/Researcher (Faculty Research Assistant), National Consortium for the Study of Terrorism and Response to Terrorism, University of Maryland 01/2014 – 05/2014 Research Assistant, Department of Geography and Anthropology, Louisiana State University 08/2010 – 12/2013 Teaching Assistant, Department of Geography and Anthropology, Louisiana State University Internships 06/2012 – 08/2012, Louisiana Geographic Information Center, Baton Rouge, LA 06/2009 – 02/2010, Bureau of Mapping and Surveying of Hubei Province, China Research Interests Geographic Information Systems, Spatial Analysis/Spatial Statistics, Quantitative Methods, Urban Planning, Public Health, Transportation, Crime, Terrorism and Society Publications Peer-review Publications: Xu, Y. & S. Owusu-Agyemang (2019) Gun-related Crime in Detroit, Michigan: Exploring the Spatial Context of Licensed Firearm Availability and Neighborhood Characteristics. Papers in Applied Geography. DOI: 10.1080/23754931.2019.1619192 Du, H., Y. Cai, F. Zhou, H. Jiang, W.
    [Show full text]
  • Jianpeng Xu1
    Jianpeng Xu1 Email: [email protected] 4719 Alex Dr. San Jose, CA, 95130 (517) 881-6889 EDUCATION Ph.d Degree, Computer Science and Engineering, Michigan State University (MSU) Fall 2011 - Summer 2017 Advisor: Pang-Ning Tan M.S Degree, Computer Science, Harbin Institute of Technology (HIT), China Fall 2007 - Spring 2010 B.S Degree, Computer Science, Shandong University (SDU), China Fall 2003 - Spring 2007 WORK EXPERIENCE Data Scientist WalmartLabs November 2018-Present Sunnyvale, CA Learning to Rank, Recommendation Systems, Personalization Data Scientist eBay. Inc August 2016-November 2018 San Jose, CA Deals Subsidy, Information Retrieval, Anomaly Detection Research Assistant MSU Fall 2013- Spring 2016 East Lansing, MI Geospatio-temporal Data Mining, Multi-task Learning, Personalized medical modeling Intern Data Scientist Samsung Research America Spring, Summer 2015 San Jose, CA Recommendation system for Samsung Smart TV. Build TV Ads system, especially for the large- scale data streaming and database support. (Techniques including Hadoop, Spark, Pig, Java, Scala, Python, bash, etc.) Intern Data Scientist Samsung Research America Summer 2014 San Jose, CA Analysis on user behavior and user demographics using smart TV watching history. Teaching Assistant MSU Spring 2013 East Lansing, MI Teaching Assistant for the course Computational Techniques for Large-Scale Data Analysis (CSE491/891), covering techniques including Hadoop, Pig, Hive, Mahout, as well as AWS. Intern Software Engineer Narus Inc Summers 2012 Sunnyvale, CA Develop methods to detect malicious endpoints using data mining techniques, including label prop- agation. Research Assistant MSU Fall 2011-Fall 2012 East Lansing, MI Land cover and land use change detection using MODIS data. 1CV udpated on December 8, 2019.
    [Show full text]
  • Curriculum Vitae
    CURRICULUM VITAE Prof. Pingyi Xu (徐评议) PhD & Postdoc Supervisor Director of Neurology the First Affiliated Hospital of Guangzhou Medical University Telephone: (86)13826161149 Email: [email protected] or [email protected] EDUCATION 1994: PhD, MD of Neurology, the First Affiliated Hospital Sun Yat-sen University of Medical Sciences, P. R. CHINA 1986: Bachelor’s in clinical medicine Jiangxi Medical University, P. R. CHINA POSITION HELD 2015.08 to present: Professor, Director, PhD supervisor & Postdoc advisor Department of Neurology, the First Affiliated Hospital of Guangzhou Medical University. 2004.01 to 2015.08: Professor & PhD supervisor & Postdoc advisor Department of Neurology, the First Affiliated Hospital of Sun Yat-sen University, CHINA; 2006.09 to 2007.09: Senior visiting scholar, Neuroscience of University of Kansas State Medical Center, USA; 2003.01 to 2004.01: Associate professor & Deputy chief physician, Department of Neurology, the First Affiliated Hospital of Sun Yat-sen University, CHINA; 2000.02 to 2002.10: Postdoc in Department of Neurology & Neuroscience, Methodist hospital Baylor College of Medicine, USA; 1994.07 to 2000.02: Attending physician & Lecturer, Department of Neurology, the First Affiliated Hospital of Sun Yat-sen University, CHINA. ACADEMIC AWARDS AND HONORS 1. National Science and Technology Progress Award (2nd Class), State Ministry of Science and Technology, P. R. China, 2000 2. Science and Technology Progress Award (1st Class), the Ministry of Health, P. R. China, 1999 3. Science and Technology Progress Award in Medical Health (2nd Class), Guangdong province, P. R. China, 1999 4. Guangdong Science and Technology Progress Award (2nd Class), Guangdong province, P. R. China, 1999 MEMBER OF SOCIETY AND PROFESSIONAL BODY 1.
    [Show full text]
  • Dean's List Australia
    THE OHIO STATE UNIVERSITY Dean's List SPRING SEMESTER 2020 Australia Data as of June 15, 2020 Sorted by Zip Code, City and Last Name Student Name (Last, First, Middle) City State Zip Fofanah, Osman Ngunnawal 2913 Wilson, Emma Rose Jilakin 6365 THE OHIO STATE UNIVERSITY OSAS - Analysis and Reporting June 15, 2020 Page 1 of 142 THE OHIO STATE UNIVERSITY Dean's List SPRING SEMESTER 2020 Bahamas Data as of June 15, 2020 Sorted by Zip Code, City and Last Name Student Name (Last, First, Middle) City State Zip Campbell, Caronique Leandra Nassau Ferguson, Daniel Nassau SP-61 THE OHIO STATE UNIVERSITY OSAS - Analysis and Reporting June 15, 2020 Page 2 of 142 THE OHIO STATE UNIVERSITY Dean's List SPRING SEMESTER 2020 Belgium Data as of June 15, 2020 Sorted by Zip Code, City and Last Name Student Name (Last, First, Middle) City State Zip Lallemand, Martin Victor D Orp Le Grand 1350 THE OHIO STATE UNIVERSITY OSAS - Analysis and Reporting June 15, 2020 Page 3 of 142 THE OHIO STATE UNIVERSITY Dean's List SPRING SEMESTER 2020 Brazil Data as of June 15, 2020 Sorted by Zip Code, City and Last Name Student Name (Last, First, Middle) City State Zip Rodrigues Franklin, Ana Beatriz Rio De Janeiro 22241 Marotta Gudme, Erik Rio De Janeiro 22460 Paczko Bozko Cecchini, Gabriela Porto Alegre 91340 THE OHIO STATE UNIVERSITY OSAS - Analysis and Reporting June 15, 2020 Page 4 of 142 THE OHIO STATE UNIVERSITY Dean's List SPRING SEMESTER 2020 Canada Data as of June 15, 2020 Sorted by Zip Code, City and Last Name City State Zip Student Name (Last, First, Middle) Beijing
    [Show full text]
  • My Tomb Will Be Opened in Eight Hundred Yearsâ•Ž: a New Way Of
    Bryn Mawr College Scholarship, Research, and Creative Work at Bryn Mawr College History of Art Faculty Research and Scholarship History of Art 2012 'My Tomb Will Be Opened in Eight Hundred Years’: A New Way of Seeing the Afterlife in Six Dynasties China Jie Shi Bryn Mawr College, [email protected] Follow this and additional works at: https://repository.brynmawr.edu/hart_pubs Part of the History of Art, Architecture, and Archaeology Commons Let us know how access to this document benefits ou.y Custom Citation Shi, Jie. 2012. "‘My Tomb Will Be Opened in Eight Hundred Years’: A New Way of Seeing the Afterlife in Six Dynasties China." Harvard Journal of Asiatic Studies 72.2: 117–157. This paper is posted at Scholarship, Research, and Creative Work at Bryn Mawr College. https://repository.brynmawr.edu/hart_pubs/82 For more information, please contact [email protected]. Shi, Jie. 2012. "‘My Tomb Will Be Opened in Eight Hundred Years’: Another View of the Afterlife in the Six Dynasties China." Harvard Journal of Asiatic Studies 72.2: 117–157. http://doi.org/10.1353/jas.2012.0027 “My Tomb Will Be Opened in Eight Hundred Years”: A New Way of Seeing the Afterlife in Six Dynasties China Jie Shi, University of Chicago Abstract: Jie Shi analyzes the sixth-century epitaph of Prince Shedi Huiluo as both a funerary text and a burial object in order to show that the means of achieving posthumous immortality radically changed during the Six Dynasties. Whereas the Han-dynasty vision of an immortal afterlife counted mainly on the imperishability of the tomb itself, Shedi’s epitaph predicted that the tomb housing it would eventually be ruined.
    [Show full text]
  • Interval Constraint-Based Mutation Testing of Numerical Specifications
    Interval Constraint-Based Mutation Testing of Numerical Specifications Clothilde Jeangoudoux Eva Darulova Christoph Lauter [email protected] [email protected] [email protected] MPI-SWS MPI-SWS University of Alaska Anchorage Germany Germany USA ABSTRACT kill all mutants), i.e. include at least one test to show that the target Mutation testing is an established approach for checking whether code’s behavior differs from the mutant’s. code satisfies a code-independent functional specification, and for Mutation testing has been successful in a number of domains, evaluating whether a test set is adequate. Current mutation testing such as real-time embedded systems [25], hardware verification in approaches, however, do not account for accuracy requirements the micro-electronics industry [60] or more recently performance that appear with numerical specifications implemented in floating- testing [23]. Unfortunately, these techniques are not suitable for point arithmetic code, but which are a frequent part of safety-critical numerical specifications that appear frequently for instance in au- software. We present Magneto, an instantiation of mutation testing tomotive or avionics applications, because they ignore rounding that fully automatically generates a test set from a real-valued spec- errors due to finite-precision arithmetic. ification. The generated tests check numerical code for accuracy, Such numerical functional specifications are given in terms of robustness and functional behavior bugs. Our technique is based on real values, but their implementations are (of necessity) written in formulating test case and oracle generation as a constraint satisfac- terms of finite precision such as floating-point arithmetic [2]. Effec- tion problem over interval domains, which soundly bounds errors, tively, this means that the code can only implement the functional but is nonetheless efficient.
    [Show full text]
  • THE CHANGMA DIAMOND DISTRICT, MENGYIN, SHANDONG PROVINCE, CHINA ------By Peter C
    THE CHANGMA DIAMOND DISTRICT, MENGYIN, SHANDONG PROVINCE, CHINA - -- -- -- By Peter C. Keller and Wan Guo-dong Since the early 196Os, Chinese geologists n recent years, the People's Republic of China has taken have conducted extensive exploration for Ia keen interest in identifying and developing its gem- diamonds. One of their most important stone resources. The most notable of these resources is discoveries to date is the Chnnglna kim- their potentially important diamond deposits. Since the berlite district in Shandong Province, Chinese initiated a concerted diamond-exploration pro- which encompasses twopipes and eight gram in the early 1960s, at least six diamond-bearing dis- dikes. The most active mine currently, the tricts have been brought into production. Four of these- Victory No. I, produces approximately 6,000 ct of diamonds annually, 20% of the Yuan River, Changde County, in Hunan Province; which are gem quality. The ore is processed Yingcheng in Hubei Province; and Linshu and Tancheng locnlly and the rough stones ore given a counties in Shandong Province-are secondary or alluvial. preliminary sort before they are sent to In the remaining two districts, diamonds are currently special factories for cutting. Large, good- mined from kimberlites: the Binhai mine near Fuxian in quality stones have been recovered at Fu County, Liaoning Province, and the Changma kimber- Changma; the largest to date weighs more lite district in Mengyin County, Shandong Province (see than 119 ct. the map in figure 1, Keller and Wang, 1986).The purpose of this article is to describe the little-known Changma kim- berlite district, one of the most important in China, and specifically the mining and processing observed at Changma by the authors in September 1985.
    [Show full text]
  • An Overview of Imperial China's Dynasties
    Ms. Kimball History- 6th Grade Week 7 5/18 - 5/22 Name: Date: Per An overview of imperial China’s dynasties By National Geographic Society, adapted by Newsela staff on 05.17.19 Word Count 1,009 Level 1020L Image 1. The Great Wall of China stretches more than 13,000 miles. The most well-known sections were built during the Ming dynasty (1368–1644). Photo: Jeff Hu/Getty Images The Chinese empire was one of the most enduring empires on Earth. Throughout its long history, various dynasties — families that ruled the empire across generations — rose and fell. Single dynastic families often remained in power for hundreds of years, until being replaced by another powerful family group. The throne was passed down from father to son. Myth Or Reality? The Xia dynasty is traditionally said to be the first of many ancient Chinese ruling houses. It is thought to have existed from around 2070 B.C. until 1600 B.C. Yet the actual existence of this dynasty has been debated. Many researchers see it as nothing but a myth. This article is available at 5 reading levels at https://newsela.com. Ms. Kimball History- 6th Grade Week 7 5/18 - 5/22 The first Xia king, Yu, is said to have repaired the damage caused by a major flood. For this reason, legend has it, the gods awarded him the Mandate of Heaven, or the right to rule. Archaeologists have found evidence of large-scale floods from around the Xia time period, so the traditional story might be at least partly true.
    [Show full text]